Data Security (Cambridge (CIE) A Level Computer Science): Exam Questions

Exam code: 9618

32 mins8 questions
13 marks

A program is written in a high-level language by a team of three programmers using an Integrated Development Environment (IDE).

The file containing the final program code will be sent by email for beta testing.

Identify one security method that can be used to protect the program code from unauthorised access during email transfer.

Explain how your chosen method protects the program code.

23 marks

The bank also needs to keep its customers’ data private and secure.

The bank’s network has a firewall.

Explain how a firewall can help protect the customers’ data.

36 marks

An assessment board scans exam papers and stores the digitised papers on a server. Exam markers download the digitised papers to mark. The exam markers then upload the mark for each paper.

The assessment board needs to make sure the data stored on the server is secure.

(i) Authentication methods can help to protect the server against hackers.

Identify one other security measure that helps to protect the server from hackers.

Describe how the security measure works.

(3)

(ii) Identify one security measure that helps to protect the data when it is being transmitted to its destination. Describe how the security measure works.

(3)

42 marks

Robots are used to serve food and drink to customers at a restaurant.

Robot waiter with trays stands in a restaurant setting with round tables and chairs, suggesting automated serving service in dining environment.

The data from the robots is transmitted to a central computer using a wireless connection.

Explain how encryption can protect the security of data during transmission.

54 marks

Authentication is one method a Database Management System (DBMS) can use to improve the security of a database.

Describe other methods that a DBMS can use to improve the security of a database.

6a1 mark

State the meaning of privacy of data.

6b1 mark

State the meaning of integrity of data.

6c4 marks

Describe the following threats to a computer system.

Phishing email

Spyware

73 marks

A company sells online Computer Science courses to students in different countries.

The courses are stored on a public cloud.

State how the following security measures can be used to protect computer systems.

Firewall ...............................................

Encryption ..........................................

Passwords ..........................................

8a2 marks

State one difference and one similarity between pharming and phishing.

8b3 marks

Explain how the data security risks of malware can be restricted.